The first step in many attacks is to get some code to the system to be attacked.

Then the attack only needs to find a way to get the code executed.

This header is designed to mitigate MIME-Sniffing attacks.

Support for this header was added in Internet Explorer 8 (IE8)Only users of Internet Explorer 8 (IE8) will benefit from X-Content-Type-Options.

Xml Text Reader reader = new Xml Text Reader(stream); reader. If you are using Xml Reader Settings, you do not need to set Prohibit Dtd to true explicitly, but it is recommended for safety sake that you do.

Prohibit Dtd = true; Xml Reader Settings settings = new Xml Reader Settings(); settings. Also note that the Xml Document class allows entity resolution by default.An attacker can nest multiple entities to create an exponential expansion XML bomb that consumes all available memory on the system.Alternatively, he can create an external reference that streams back an infinite amount of data or that simply hangs the thread.It depends on what the application does with the uploaded file and especially where it is stored. Following security controls should be implemented for File Upload functionality: If you use the Parameters collection, SQL treats the input is as a literal value rather then as executable code.The Parameters collection can be used to enforce type and length constraints on input data. If type-safe SQL parameters are not used, attackers might be able to execute injection attacks that are embedded in the unfiltered input.Use type safe parameters when constructing SQL queries to avoid possible SQL injection attacks that can occur with unfiltered input.